The Ability of solution to detect the content going out of any organization with less false positives. The Detection Policies Like DCM , EDM , Vector Machine Learning and IDM are very robust and gives the complete visibility of the data Across endpoint , network , storage and gateway.
Monitor/block data copied to removable storage devices
Monitor/block corporate email via Microsoft Outlook or Lotus Notes
Monitor/block HTTP/S transmissions
Monitor/block FTP transmissions
Monitor/block copy or paste actions done via the Windows clipboard
Monitor/blocks Microsoft Office 2013 file formats for detection and application monitoring, including the default formats for Microsoft Access, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, and Word.
On-screen, pop-up notification with hyperlinks and fields for user justification can appear upon the generation of an incident
Any mails sent to external party from the personal email id’s – Attachments to be captured
Detection of confidential data using keywords
Custom data identification policies. Example data with employee id / SSN / etc
Discover data on endpoints and take suitable actions
Document in tabular format detection
Detection of fingerprinted data.
Advanced Fingerprinting technique of detection.
Incident management and data retention